Avdoshin et al., 2018 - Google Patents
Bitcoin users deanonimization methodsAvdoshin et al., 2018
View HTML- Document ID
- 3340872526574264386
- Author
- Avdoshin S
- Lazarenko A
- Publication year
- Publication venue
- Труды Института системного программирования РАН
External Links
Snippet
Bitcoin is the most popular cryptocurrency on the planet. It relies on strong cryptography and peer-to-peer network. Bitcoin is gaining more and more popularity in criminal society. That is why Bitcoin is often used as money laundering tool or payment method for illegal products …
- 238000000034 method 0 abstract description 25
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage | |
| Saleem et al. | The anonymity of the dark web: A survey | |
| Conti et al. | A survey on security and privacy issues of bitcoin | |
| Rahouti et al. | Bitcoin concepts, threats, and machine-learning security solutions | |
| Singh et al. | SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology | |
| Herskind et al. | Privacy and cryptocurrencies—A systematic literature review | |
| Ogiela et al. | Security of distributed ledger solutions based on blockchain technologies | |
| Bojja Venkatakrishnan et al. | Dandelion: Redesigning the bitcoin network for anonymity | |
| Ali et al. | ZombieCoin 2.0: managing next-generation botnets using Bitcoin | |
| Plohmann et al. | Case study of the miner botnet | |
| Badsha et al. | Privacy preserving location-aware personalized web service recommendations | |
| Islam et al. | A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency | |
| Li et al. | EdgeWatch: Collaborative investigation of data integrity at the edge based on blockchain | |
| Böck et al. | Assessing the threat of blockchain-based botnets | |
| Bhandari et al. | Machine learning and blockchain integration for security applications | |
| Avdoshin et al. | Bitcoin users deanonimization methods | |
| Yan et al. | Blockchain abnormal behavior awareness methods: a survey | |
| Klusman et al. | Deanonymisation in ethereum using existing methods for bitcoin | |
| Zhang | Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of Dash, Monero, Verge, Zcash, and Grin | |
| Sayeed et al. | On the effectiveness of blockchain against cryptocurrency attacks | |
| Guan et al. | Characterizing Ethereum address poisoning attack | |
| Loudet et al. | SEP2P: secure and efficient P2P personal data processing | |
| Yu et al. | Robust clustering of Ethereum transactions using time leakage from fixed nodes | |
| Zhao | Graph-based forensic investigation of bitcoin transactions | |
| Andre et al. | Smartor: Smarter tor with smart contracts: Improving resilience of topology distribution in the tor network |